Files
smartregistry/readme.md

887 lines
28 KiB
Markdown

# @push.rocks/smartregistry
> 🚀 A composable TypeScript library implementing **OCI Distribution Specification v1.1**, **NPM Registry API**, **Maven Repository**, **Cargo/crates.io Registry**, **Composer/Packagist**, **PyPI (Python Package Index)**, and **RubyGems Registry** — everything you need to build a unified container and package registry in one library.
## Issue Reporting and Security
For reporting bugs, issues, or security vulnerabilities, please visit [community.foss.global/](https://community.foss.global/). This is the central community hub for all issue reporting. Developers who sign and comply with our contribution agreement and go through identification can also get a [code.foss.global/](https://code.foss.global/) account to submit Pull Requests directly.
## ✨ Features
### 🔄 Multi-Protocol Support
- **OCI Distribution Spec v1.1**: Full container registry with manifest/blob operations
- **NPM Registry API**: Complete package registry with publish/install/search
- **Maven Repository**: Java/JVM artifact management with POM support
- **Cargo/crates.io Registry**: Rust crate registry with sparse HTTP protocol
- **Composer/Packagist**: PHP package registry with Composer v2 protocol
- **PyPI (Python Package Index)**: Python package registry with PEP 503/691 support
- **RubyGems Registry**: Ruby gem registry with compact index protocol
### 🏗️ Unified Architecture
- **Composable Design**: Core infrastructure with protocol plugins — enable only what you need
- **Shared Storage**: Cloud-agnostic S3-compatible backend via [@push.rocks/smartbucket](https://www.npmjs.com/package/@push.rocks/smartbucket) with standardized `IS3Descriptor` from [@tsclass/tsclass](https://www.npmjs.com/package/@tsclass/tsclass)
- **Unified Authentication**: Scope-based permissions across all protocols
- **Path-based Routing**: `/oci/*`, `/npm/*`, `/maven/*`, `/cargo/*`, `/composer/*`, `/pypi/*`, `/rubygems/*`
### 🔐 Authentication & Authorization
- NPM UUID tokens for package operations
- OCI JWT tokens for container operations
- Protocol-specific tokens for Maven, Cargo, Composer, PyPI, and RubyGems
- Unified scope system: `npm:package:foo:write`, `oci:repository:bar:push`
- **Pluggable Auth Provider** (`IAuthProvider`): Integrate LDAP, OAuth, SSO, or any custom auth
### 📦 Protocol Feature Matrix
| Feature | OCI | NPM | Maven | Cargo | Composer | PyPI | RubyGems |
|---------|-----|-----|-------|-------|----------|------|----------|
| Publish/Upload | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
| Download | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
| Search | — | ✅ | — | ✅ | — | — | — |
| Version Yank | — | — | — | ✅ | — | — | ✅ |
| Metadata API | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
| Token Auth | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
| Checksum Verification | ✅ | ✅ | ✅ | ✅ | — | ✅ | ✅ |
| Upstream Proxy | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ | ✅ |
### 🌐 Upstream Proxy & Caching
- **Multi-Upstream Support**: Configure multiple upstream registries per protocol with priority ordering
- **Scope-Based Routing**: Route specific packages/scopes to different upstreams (e.g., `@company/*` → private registry)
- **S3-Backed Cache**: Persistent caching using existing S3 storage
- **Circuit Breaker**: Automatic failover with configurable thresholds
- **Stale-While-Revalidate**: Serve cached content while refreshing in background
- **Content-Aware TTLs**: Different TTLs for immutable (tarballs) vs mutable (metadata) content
### 🌊 Streaming-First Architecture
- **Web Streams API** (`ReadableStream<Uint8Array>`) — cross-runtime (Node, Deno, Bun)
- **Zero-copy downloads**: Binary artifacts stream directly from S3 to the HTTP response
- **OCI upload streaming**: Chunked blob uploads stored as temp S3 objects, not accumulated in memory
- **Unified response type**: Every `response.body` is a `ReadableStream` — one pattern for all consumers
### 🔌 Enterprise Extensibility
- **Storage Event Hooks** (`IStorageHooks`): Quota tracking, audit logging, virus scanning, cache invalidation
- **Request Actor Context**: Pass user/org info through requests for audit trails and rate limiting
## 📥 Installation
```bash
# Using pnpm (recommended)
pnpm add @push.rocks/smartregistry
# Using npm
npm install @push.rocks/smartregistry
```
## 🚀 Quick Start
```typescript
import { SmartRegistry, IRegistryConfig } from '@push.rocks/smartregistry';
const config: IRegistryConfig = {
storage: {
accessKey: 'your-s3-key',
accessSecret: 'your-s3-secret',
endpoint: 's3.amazonaws.com',
port: 443,
useSsl: true,
region: 'us-east-1',
bucketName: 'my-registry',
},
auth: {
jwtSecret: 'your-secret-key',
tokenStore: 'memory',
npmTokens: { enabled: true },
ociTokens: {
enabled: true,
realm: 'https://auth.example.com/token',
service: 'my-registry',
},
},
// Enable only the protocols you need
oci: { enabled: true, basePath: '/oci' },
npm: { enabled: true, basePath: '/npm' },
maven: { enabled: true, basePath: '/maven' },
cargo: { enabled: true, basePath: '/cargo' },
composer: { enabled: true, basePath: '/composer' },
pypi: { enabled: true, basePath: '/pypi' },
rubygems: { enabled: true, basePath: '/rubygems' },
};
const registry = new SmartRegistry(config);
await registry.init();
// Handle any incoming HTTP request — the router does the rest
const response = await registry.handleRequest({
method: 'GET',
path: '/npm/express',
headers: {},
query: {},
});
```
## 🏛️ Architecture
### Request Flow
```
HTTP Request
SmartRegistry (orchestrator)
Path-based routing
├─→ /oci/* → OciRegistry
├─→ /npm/* → NpmRegistry
├─→ /maven/* → MavenRegistry
├─→ /cargo/* → CargoRegistry
├─→ /composer/* → ComposerRegistry
├─→ /pypi/* → PypiRegistry
└─→ /rubygems/* → RubyGemsRegistry
Shared Storage & Auth
S3-compatible backend
```
### Directory Structure
```
ts/
├── core/ # Shared infrastructure
│ ├── classes.baseregistry.ts
│ ├── classes.registrystorage.ts
│ ├── classes.authmanager.ts
│ └── interfaces.core.ts
├── oci/ # OCI implementation
├── npm/ # NPM implementation
├── maven/ # Maven implementation
├── cargo/ # Cargo implementation
├── composer/ # Composer implementation
├── pypi/ # PyPI implementation
├── rubygems/ # RubyGems implementation
├── upstream/ # Upstream proxy infrastructure
└── classes.smartregistry.ts # Main orchestrator
```
## 💡 Usage Examples
### 🐳 OCI Registry (Container Images)
```typescript
// Pull a manifest
const response = await registry.handleRequest({
method: 'GET',
path: '/oci/library/nginx/manifests/latest',
headers: { 'Authorization': 'Bearer <token>' },
query: {},
});
// Push a blob (two-step upload)
const uploadInit = await registry.handleRequest({
method: 'POST',
path: '/oci/myapp/blobs/uploads/',
headers: { 'Authorization': 'Bearer <token>' },
query: {},
});
const uploadId = uploadInit.headers['Docker-Upload-UUID'];
await registry.handleRequest({
method: 'PUT',
path: `/oci/myapp/blobs/uploads/${uploadId}`,
headers: { 'Authorization': 'Bearer <token>' },
query: { digest: 'sha256:abc123...' },
body: blobData,
});
```
### 📦 NPM Registry
```typescript
// Get package metadata
const metadata = await registry.handleRequest({
method: 'GET',
path: '/npm/express',
headers: {},
query: {},
});
// Publish a package
const publishResponse = await registry.handleRequest({
method: 'PUT',
path: '/npm/my-package',
headers: { 'Authorization': 'Bearer <npm-token>' },
query: {},
body: {
name: 'my-package',
versions: { '1.0.0': { /* version metadata */ } },
'dist-tags': { latest: '1.0.0' },
_attachments: {
'my-package-1.0.0.tgz': {
content_type: 'application/octet-stream',
data: '<base64-tarball>',
length: 12345,
},
},
},
});
// Search packages
const search = await registry.handleRequest({
method: 'GET',
path: '/npm/-/v1/search',
headers: {},
query: { text: 'express', size: '20' },
});
```
### 🦀 Cargo Registry (Rust Crates)
```typescript
// Get registry config (required for Cargo sparse protocol)
const config = await registry.handleRequest({
method: 'GET',
path: '/cargo/config.json',
headers: {},
query: {},
});
// Publish a crate (binary format: [4 bytes JSON len][JSON][4 bytes crate len][.crate])
const publishResponse = await registry.handleRequest({
method: 'PUT',
path: '/cargo/api/v1/crates/new',
headers: { 'Authorization': '<cargo-token>' },
query: {},
body: binaryPublishData,
});
// Yank a version
await registry.handleRequest({
method: 'DELETE',
path: '/cargo/api/v1/crates/my-crate/0.1.0/yank',
headers: { 'Authorization': '<cargo-token>' },
query: {},
});
```
**Using with Cargo CLI:**
```toml
# .cargo/config.toml
[registries.myregistry]
index = "sparse+https://registry.example.com/cargo/"
```
```bash
cargo publish --registry=myregistry
cargo install --registry=myregistry my-crate
```
### 🎼 Composer Registry (PHP Packages)
```typescript
// Get repository root
const packagesJson = await registry.handleRequest({
method: 'GET',
path: '/composer/packages.json',
headers: {},
query: {},
});
// Upload a package (ZIP with composer.json inside)
const uploadResponse = await registry.handleRequest({
method: 'PUT',
path: '/composer/packages/vendor/package',
headers: { 'Authorization': 'Bearer <composer-token>' },
query: {},
body: zipBuffer,
});
```
**Using with Composer CLI:**
```json
{
"repositories": [
{ "type": "composer", "url": "https://registry.example.com/composer" }
]
}
```
```bash
composer require vendor/package
```
### 🐍 PyPI Registry (Python Packages)
```typescript
// Get package index (PEP 503 HTML)
const htmlIndex = await registry.handleRequest({
method: 'GET',
path: '/simple/requests/',
headers: { 'Accept': 'text/html' },
query: {},
});
// Get package index (PEP 691 JSON)
const jsonIndex = await registry.handleRequest({
method: 'GET',
path: '/simple/requests/',
headers: { 'Accept': 'application/vnd.pypi.simple.v1+json' },
query: {},
});
// Upload a package
const upload = await registry.handleRequest({
method: 'POST',
path: '/pypi/',
headers: {
'Authorization': 'Bearer <pypi-token>',
'Content-Type': 'multipart/form-data',
},
query: {},
body: {
':action': 'file_upload',
protocol_version: '1',
name: 'my-package',
version: '1.0.0',
filetype: 'bdist_wheel',
content: wheelData,
filename: 'my_package-1.0.0-py3-none-any.whl',
},
});
```
**Using with pip:**
```bash
pip install --index-url https://registry.example.com/simple/ my-package
python -m twine upload --repository-url https://registry.example.com/pypi/ dist/*
```
### 💎 RubyGems Registry
```typescript
// Upload a gem
const uploadGem = await registry.handleRequest({
method: 'POST',
path: '/rubygems/api/v1/gems',
headers: { 'Authorization': '<rubygems-api-key>' },
query: {},
body: gemBuffer,
});
// Get compact index
const versions = await registry.handleRequest({
method: 'GET',
path: '/rubygems/versions',
headers: {},
query: {},
});
```
**Using with Bundler:**
```ruby
# Gemfile
source 'https://registry.example.com/rubygems' do
gem 'my-gem'
end
```
```bash
gem push my-gem-1.0.0.gem --host https://registry.example.com/rubygems
bundle install
```
### 🔐 Authentication
```typescript
const authManager = registry.getAuthManager();
// Authenticate user
const userId = await authManager.authenticate({ username: 'user', password: 'pass' });
// Create protocol-specific tokens
const npmToken = await authManager.createNpmToken(userId, false);
const ociToken = await authManager.createOciToken(userId, ['oci:repository:myapp:push'], 3600);
const pypiToken = await authManager.createPypiToken(userId, false);
const cargoToken = await authManager.createCargoToken(userId, false);
const composerToken = await authManager.createComposerToken(userId, false);
const rubygemsToken = await authManager.createRubyGemsToken(userId, false);
// Validate and check permissions
const token = await authManager.validateToken(npmToken, 'npm');
const canWrite = await authManager.authorize(token, 'npm:package:my-package', 'write');
```
### 🌐 Upstream Proxy Configuration
```typescript
import { SmartRegistry, StaticUpstreamProvider } from '@push.rocks/smartregistry';
const upstreamProvider = new StaticUpstreamProvider({
npm: {
enabled: true,
upstreams: [
{
id: 'company-private',
url: 'https://npm.internal.company.com',
priority: 1,
enabled: true,
scopeRules: [{ pattern: '@company/*', action: 'include' }],
auth: { type: 'bearer', token: process.env.NPM_PRIVATE_TOKEN },
},
{
id: 'npmjs',
url: 'https://registry.npmjs.org',
priority: 10,
enabled: true,
scopeRules: [{ pattern: '@company/*', action: 'exclude' }],
},
],
cache: { enabled: true, staleWhileRevalidate: true },
},
oci: {
enabled: true,
upstreams: [
{ id: 'dockerhub', url: 'https://registry-1.docker.io', priority: 1, enabled: true },
],
},
});
const registry = new SmartRegistry({
storage: { /* S3 config */ },
auth: { /* Auth config */ },
upstreamProvider,
npm: { enabled: true, basePath: '/npm' },
oci: { enabled: true, basePath: '/oci' },
});
```
### 🔌 Custom Auth Provider
```typescript
import { SmartRegistry, IAuthProvider, IAuthToken, TRegistryProtocol } from '@push.rocks/smartregistry';
class LdapAuthProvider implements IAuthProvider {
async init() { /* connect to LDAP */ }
async authenticate(credentials) {
const result = await this.ldapClient.bind(credentials.username, credentials.password);
return result.success ? credentials.username : null;
}
async validateToken(token: string, protocol?: TRegistryProtocol): Promise<IAuthToken | null> {
const session = await this.sessionStore.get(token);
return session ? { userId: session.userId, scopes: session.scopes } : null;
}
async createToken(userId: string, protocol: TRegistryProtocol, options?) {
const token = crypto.randomUUID();
await this.sessionStore.set(token, { userId, protocol, ...options });
return token;
}
async revokeToken(token: string) { await this.sessionStore.delete(token); }
async authorize(token: IAuthToken | null, resource: string, action: string) {
if (!token) return action === 'read';
return this.checkPermissions(token.userId, resource, action);
}
}
const registry = new SmartRegistry({
...config,
authProvider: new LdapAuthProvider(),
});
```
### 📊 Storage Hooks (Quota & Audit)
```typescript
import { SmartRegistry, IStorageHooks, IStorageHookContext } from '@push.rocks/smartregistry';
const storageHooks: IStorageHooks = {
async beforePut(ctx: IStorageHookContext) {
if (ctx.actor?.orgId) {
const usage = await getStorageUsage(ctx.actor.orgId);
const quota = await getQuota(ctx.actor.orgId);
if (usage + (ctx.metadata?.size || 0) > quota) {
return { allowed: false, reason: 'Storage quota exceeded' };
}
}
return { allowed: true };
},
async afterPut(ctx: IStorageHookContext) {
await auditLog.write({
action: 'storage.put',
key: ctx.key,
protocol: ctx.protocol,
actor: ctx.actor,
timestamp: ctx.timestamp,
});
},
async beforeDelete(ctx: IStorageHookContext) {
if (await isProtectedPackage(ctx.key)) {
return { allowed: false, reason: 'Cannot delete protected package' };
}
return { allowed: true };
},
};
const registry = new SmartRegistry({ ...config, storageHooks });
```
### 👤 Request Actor Context
```typescript
// Pass actor information for audit/quota tracking
const response = await registry.handleRequest({
method: 'PUT',
path: '/npm/my-package',
headers: { 'Authorization': 'Bearer <token>' },
query: {},
body: packageData,
actor: {
userId: 'user123',
tokenId: 'token-abc',
ip: req.ip,
userAgent: req.headers['user-agent'],
orgId: 'org-456',
},
});
```
## ⚙️ Configuration
### Storage Configuration
Extends `IS3Descriptor` from `@tsclass/tsclass`:
```typescript
storage: {
accessKey: string; // S3 access key
accessSecret: string; // S3 secret key
endpoint: string; // S3 endpoint (e.g., 's3.amazonaws.com')
port?: number; // Default: 443
useSsl?: boolean; // Default: true
region?: string; // AWS region
bucketName: string; // Bucket name for registry storage
}
```
### Authentication Configuration
```typescript
auth: {
jwtSecret: string;
tokenStore: 'memory' | 'redis' | 'database';
npmTokens: { enabled: boolean; defaultReadonly?: boolean };
ociTokens: { enabled: boolean; realm: string; service: string };
pypiTokens: { enabled: boolean };
rubygemsTokens: { enabled: boolean };
}
```
### Protocol Configuration
Each protocol accepts:
```typescript
{
enabled: boolean;
basePath: string; // URL prefix, e.g. '/npm'
registryUrl?: string; // Public-facing base URL (used in generated metadata links)
features?: Record<string, boolean>;
}
```
The `registryUrl` is important when the registry is served behind a reverse proxy or on a non-default port. For example, if your server is at `https://registry.example.com`, set `registryUrl: 'https://registry.example.com/npm'` for the NPM protocol so that generated metadata URLs point to the correct host.
## 📚 API Reference
### Core Classes
#### SmartRegistry
Main orchestrator — routes requests to the appropriate protocol handler.
| Method | Description |
|--------|-------------|
| `init()` | Initialize the registry and all enabled protocols |
| `handleRequest(context)` | Route and handle an HTTP request |
| `getStorage()` | Get the shared `RegistryStorage` instance |
| `getAuthManager()` | Get the shared `AuthManager` instance |
| `getRegistry(protocol)` | Get a specific protocol handler by name |
| `isInitialized()` | Check if the registry has been initialized |
| `destroy()` | Clean up resources |
### Protocol Endpoints
#### OCI Registry
| Method | Path | Description |
|--------|------|-------------|
| `GET` | `/{name}/manifests/{ref}` | Get manifest by tag or digest |
| `PUT` | `/{name}/manifests/{ref}` | Push manifest |
| `GET` | `/{name}/blobs/{digest}` | Get blob |
| `POST` | `/{name}/blobs/uploads/` | Initiate blob upload |
| `PUT` | `/{name}/blobs/uploads/{uuid}` | Complete blob upload |
| `GET` | `/{name}/tags/list` | List tags |
| `GET` | `/{name}/referrers/{digest}` | Get referrers (OCI 1.1) |
#### NPM Registry
| Method | Path | Description |
|--------|------|-------------|
| `GET` | `/{package}` | Get package metadata (packument) |
| `PUT` | `/{package}` | Publish package |
| `GET` | `/{package}/-/{tarball}` | Download tarball |
| `GET` | `/-/v1/search?text=...` | Search packages |
| `PUT` | `/-/user/org.couchdb.user:{user}` | Login |
| `GET/POST/DELETE` | `/-/npm/v1/tokens` | Token management |
| `PUT` | `/-/package/{pkg}/dist-tags/{tag}` | Manage dist-tags |
#### Maven Repository
| Method | Path | Description |
|--------|------|-------------|
| `PUT` | `/{group}/{artifact}/{version}/{file}` | Upload artifact |
| `GET` | `/{group}/{artifact}/{version}/{file}` | Download artifact |
| `GET` | `/{group}/{artifact}/maven-metadata.xml` | Get metadata |
#### Cargo Registry
| Method | Path | Description |
|--------|------|-------------|
| `GET` | `/config.json` | Registry configuration |
| `GET` | `/{p1}/{p2}/{name}` | Sparse index entry |
| `PUT` | `/api/v1/crates/new` | Publish crate (binary format) |
| `GET` | `/api/v1/crates/{crate}/{version}/download` | Download .crate |
| `DELETE` | `/api/v1/crates/{crate}/{version}/yank` | Yank version |
| `PUT` | `/api/v1/crates/{crate}/{version}/unyank` | Unyank version |
| `GET` | `/api/v1/crates?q=...` | Search crates |
#### Composer Registry
| Method | Path | Description |
|--------|------|-------------|
| `GET` | `/packages.json` | Repository metadata |
| `GET` | `/p2/{vendor}/{package}.json` | Package version metadata |
| `GET` | `/packages/list.json` | List all packages |
| `GET` | `/dists/{vendor}/{package}/{ref}.zip` | Download package ZIP |
| `PUT` | `/packages/{vendor}/{package}` | Upload package |
| `DELETE` | `/packages/{vendor}/{package}[/{version}]` | Delete package/version |
#### PyPI Registry
| Method | Path | Description |
|--------|------|-------------|
| `GET` | `/simple/` | List all packages (PEP 503/691) |
| `GET` | `/simple/{package}/` | List package files |
| `POST` | `/` | Upload package (multipart) |
| `GET` | `/pypi/{package}/json` | Package metadata API |
| `GET` | `/pypi/{package}/{version}/json` | Version metadata |
| `GET` | `/packages/{package}/{filename}` | Download file |
#### RubyGems Registry
| Method | Path | Description |
|--------|------|-------------|
| `GET` | `/versions` | Master versions file (compact index) |
| `GET` | `/info/{gem}` | Gem info file |
| `GET` | `/names` | List all gem names |
| `POST` | `/api/v1/gems` | Upload .gem file |
| `DELETE` | `/api/v1/gems/yank` | Yank version |
| `PUT` | `/api/v1/gems/unyank` | Unyank version |
| `GET` | `/api/v1/versions/{gem}.json` | Version metadata |
| `GET` | `/gems/{gem}-{version}.gem` | Download .gem file |
## 🎯 Scope Format
Unified scope format across all protocols:
```
{protocol}:{type}:{name}:{action}
Examples:
npm:package:express:read # Read express package
npm:package:*:write # Write any package
oci:repository:nginx:pull # Pull nginx image
oci:repository:*:push # Push any image
cargo:crate:serde:write # Write serde crate
composer:package:vendor/pkg:read # Read Composer package
pypi:package:requests:read # Read PyPI package
rubygems:gem:rails:write # Write RubyGems gem
{protocol}:*:*:* # Full access for a protocol
```
## 🗄️ Storage Structure
```
bucket/
├── oci/
│ ├── blobs/sha256/{hash}
│ ├── manifests/{repository}/{digest}
│ └── tags/{repository}/tags.json
├── npm/
│ └── packages/{name}/
│ ├── index.json # Packument
│ └── {name}-{ver}.tgz # Tarball
├── maven/
│ ├── artifacts/{group}/{artifact}/{version}/
│ └── metadata/{group}/{artifact}/maven-metadata.xml
├── cargo/
│ ├── config.json
│ ├── index/{p1}/{p2}/{name} # Sparse index
│ └── crates/{name}/{name}-{ver}.crate
├── composer/
│ └── packages/{vendor}/{package}/
│ ├── metadata.json
│ └── {reference}.zip
├── pypi/
│ ├── simple/index.html
│ ├── simple/{package}/index.html
│ ├── packages/{package}/{filename}
│ └── metadata/{package}/metadata.json
└── rubygems/
├── versions
├── info/{gemname}
├── names
└── gems/{gemname}-{version}.gem
```
## 🌊 Streaming Architecture
All responses from `SmartRegistry.handleRequest()` use the **Web Streams API**. The `body` field on `IResponse` is always a `ReadableStream<Uint8Array>` — whether the content is a 2GB container image layer or a tiny JSON metadata response.
### How It Works
- **Binary downloads** (blobs, tarballs, .crate, .zip, .whl, .gem) stream directly from S3 to the response — zero buffering in memory
- **JSON/metadata responses** are automatically wrapped into a `ReadableStream` at the API boundary
- **OCI chunked uploads** store each PATCH chunk as a temp S3 object instead of accumulating in memory, then stream-assemble during the final PUT with incremental SHA-256 verification
### Stream Helpers
```typescript
import { streamToBuffer, streamToJson, toReadableStream } from '@push.rocks/smartregistry';
// Consume a stream into a Buffer
const buffer = await streamToBuffer(response.body);
// Consume a stream into parsed JSON
const data = await streamToJson(response.body);
// Create a ReadableStream from any data type
const stream = toReadableStream({ hello: 'world' });
```
### Consuming in Node.js HTTP Servers
Since Node.js `http.ServerResponse` uses Node streams, bridge with `Readable.fromWeb()`:
```typescript
import { Readable } from 'stream';
if (response.body) {
Readable.fromWeb(response.body).pipe(res);
} else {
res.end();
}
```
## 🔌 Integration with Express
```typescript
import express from 'express';
import { Readable } from 'stream';
import { SmartRegistry } from '@push.rocks/smartregistry';
const app = express();
const registry = new SmartRegistry(config);
await registry.init();
app.all('*', async (req, res) => {
const response = await registry.handleRequest({
method: req.method,
path: req.path,
headers: req.headers as Record<string, string>,
query: req.query as Record<string, string>,
body: req.body,
});
res.status(response.status);
for (const [key, value] of Object.entries(response.headers)) {
res.setHeader(key, value);
}
if (response.body) {
// All response bodies are ReadableStream<Uint8Array> — pipe to HTTP response
Readable.fromWeb(response.body).pipe(res);
} else {
res.end();
}
});
app.listen(5000);
```
## 🧪 Testing with smartstorage
smartregistry works seamlessly with [@push.rocks/smartstorage](https://code.foss.global/push.rocks/smartstorage), a local S3-compatible server for testing — no cloud credentials needed.
```typescript
import { SmartStorage } from '@push.rocks/smartstorage';
import { SmartRegistry } from '@push.rocks/smartregistry';
// Start local S3 server
const s3Server = await SmartStorage.createAndStart({
server: { port: 3456, silent: true },
storage: { cleanSlate: true },
});
// Get S3 descriptor from the running server
const s3Descriptor = await s3Server.getStorageDescriptor();
const registry = new SmartRegistry({
storage: { ...s3Descriptor, bucketName: 'my-test-registry' },
auth: { jwtSecret: 'test', tokenStore: 'memory', npmTokens: { enabled: true } },
npm: { enabled: true, basePath: '/npm' },
oci: { enabled: true, basePath: '/oci' },
});
await registry.init();
// ... run your tests ...
await s3Server.stop();
```
## 🛠️ Development
```bash
pnpm install # Install dependencies
pnpm run build # Build
pnpm test # Run all tests
```
## License and Legal Information
This repository contains open-source code licensed under the MIT License. A copy of the license can be found in the [LICENSE](./LICENSE) file.
**Please note:** The MIT License does not grant permission to use the trade names, trademarks, service marks, or product names of the project, except as required for reasonable and customary use in describing the origin of the work and reproducing the content of the NOTICE file.
### Trademarks
This project is owned and maintained by Task Venture Capital GmbH. The names and logos associated with Task Venture Capital GmbH and any related products or services are trademarks of Task Venture Capital GmbH or third parties, and are not included within the scope of the MIT license granted herein.
Use of these trademarks must comply with Task Venture Capital GmbH's Trademark Guidelines or the guidelines of the respective third-party owners, and any usage must be approved in writing. Third-party trademarks used herein are the property of their respective owners and used only in a descriptive manner, e.g. for an implementation of an API or similar.
### Company Information
Task Venture Capital GmbH
Registered at District Court Bremen HRB 35230 HB, Germany
For any legal inquiries or further information, please contact us via email at hello@task.vc.
By using this repository, you acknowledge that you have read this section, agree to comply with its terms, and understand that the licensing of the code does not imply endorsement by Task Venture Capital GmbH of any derivative works.